Kony continues to grow rapidly with customers across the globe choosing us for the widest multi-channel support across form factors. We partner with leading technology and solutions companies to extend our reach and that list also continues to grow.
Similar to our full-spectrum mobile application support, we now provide a robust mobile management solution that secures data, apps and devices. Not only is it necessary to secure data, apps and devices, but it’s important to do it in a manner that both end-users and administrators find easy to use so that the solution can scale as more and more mobile devices are used within the enterprise.
Centralized Web-Based Management ConsoleRegister User for MDM or Bulk Update User List for MDMUser and Group ManagementActive Directory or LDAP IntegrationManage Enterprise Device Configuration SetsEmail, VPN, WiFi, etc. SettingsLocate a User’s Device or Group of Devices on a MapLock a Device to Block All AccessWipe All User and App Data on a DeviceMonitor Device Runtime and Configuration InformationMonitor Individual App Runtime InformationManage Compliance Rules and Remediation StepsMonitor for Jailbroken DevicesConfiguration Remediation StepsMessage UserRevoke EmailLock DeviceWipe DeviceOn-Device MDM ProfileProvide Communication Link Back to MDMEnforce Device Restrictions (e.g. Passcode Required)Receive and Set Enterprise ConfigurationsEmail, VPN, WiFi, etc. SettingsReceive Push NotificationsPeriodically Log Device Location if Requested by MDM Console Monitor Device Configuration and App Usage
Centralized Web-Based Management ConsoleMobile App Distribution LifecycleUser and Group Management (Active Directory or LDAP)Manage App Security PoliciesView and Schedule Usage ReportingWipe App Data and/or Disable Access to AppsSecure Mobile App ContainerCentralized Access Control on the DeviceMobile App Single Sign-OnData Sharing Between AppsReceive Push NotificationsSecure Browser for Mobile Web AppsEnterprise App StoreBrowse Available Enterprise AppsView and Submit Ratings and ReviewsProvide App Feedback or Defect to AdminReceive App UpdatesSearch Apps or View Most PopularApplication Security Policy EnforcementRuntime App Security Policy EnforcementTarget Different Policies Based on User, Group, Device Type and AppExtensible Security Policy FrameworkFIPS-140 Data App Data Encryption
Centralized Web-Based Management ConsoleContent Distribution LifecycleUser and Group ManagementManage Content Security PoliciesView and Schedule Usage ReportingDisable Access to ContentWipe Content from DeviceContent Locker on DeviceCentralized Content Access Control on DeviceNotifications of Available Content UpdatesView and Modify ContentFacilitate Content Sync between UsersAbility to Launch Native Players and Content Viewing Apps for various content typesContent Security Policy EnforcementRuntime Content Security PolicyEnforcement through Content LockerTarget Different Policies Based on User, Group, Device Type and AppRestrict Content based on user authorization, Device Type, Time, Location, etc.FIPS-140 Data App Data Encryption
Enterprise Directory is synced to ensure the latest changes in your org structure are reflected immediately Auditing and reporting tools that reduce the burden of administrationRule-based actions on violations including cutting off a device from the networkSAAS and on-premise modelsKony’s integrated Push Notification System simplifies sending updates and messages to users regardless of their mobile device
- Agenda talk through
While other vendors claim to provide coverage for devices, apps or data, they lack in one or more of the segments. For example app management may be limited to white- or black-listing applications on the device, and not include app-specific data and policy management, or integration with enterprise app purchase plans and other important features. Kony ensures you get class-leading features for all layers of mobile security.
You can secure any mobile application in a few simple steps – just upload the binary file to your management console and get an updated binary file that supports all the security policies you want to create.
Reiterate Kony’s broadest support history for OSes and form factors.